What is your understanding of the difference between a stream cipher and a block cipher?

Answers

Answer 1

Answer:

In a stream cipher, the information is ciphered byte-by-byte.

In a block cipher, the information is ciphered block by block.

Explanation:

Suppose I have the following text:

Buffalo Bills New England Patriots

New York Jets Miami Dolphins

Each line is one byte, so, on the stream cipher, i am going to apply the ciphering algorithm on:

The letter B

The letter u

The letter f

Until

The letter s(of Miami Dolphins)

Now for the block cipher, i am saying that each line is a block, so the algorithm is going to be applied.

First on: Buffalo Bills New England Patriots

Then: New York Jets Miami Dolphins

Answer 2

Final answer:

A stream cipher processes input data bit by bit or byte by byte, generating a stream of encrypted output. A block cipher divides input data into fixed-length blocks and encrypts each block separately using a fixed encryption algorithm and a secret key.

Explanation:

A stream cipher and a block cipher are two different encryption techniques used in computer cryptography. The main difference between them lies in the way they encrypt data. A stream cipher processes the input message bit by bit or byte by byte, generating a stream of encrypted output. This stream is combined with the plaintext using a bitwise operation such as XOR to produce the ciphertext. Stream ciphers are typically used for real-time applications or when individual bits need to be encrypted and decrypted.

On the other hand, a block cipher divides the input message into fixed-length blocks, usually 64 or 128 bits, and encrypts each block separately. The blocks are encrypted using a fixed encryption algorithm and a secret key. Block ciphers are commonly used for securely encrypting large amounts of data in a fixed block size.


Related Questions

Which media access method is used by twisted-pair Ethernet networks? (Please select one of the four options)

CSMA/CD

Token passing

CSMA/CA

OFDMA

Answers

Answer: CSMA/CD

Explanation:

 CSMA/CD (Carrier sense multiple access with collision detection) is the media access that is use by the twisted pair ethernet networks. The CDMA/CD is one of the protocol that is used by the various types of computer ethernet in the network.

The carrier sense multiple access is one of the part of MAC (media access protocol) protocol that is implemented by the multiple ethernet networking in the system.

Final answer:

Twisted-pair Ethernet networks use the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access method. This allows devices to detect if the network is free and manage collisions if they occur.

Explanation:

The media access method used by twisted-pair Ethernet networks is CSMA/CD (Carrier Sense Multiple Access with Collision Detection). This method allows devices to sense whether the network is free before they send data. If two devices detect that the network is free and start sending data at the same time, a collision occurs. In this situation, the devices stop transmitting for a random length of time before attempting to send the data again.

Learn more about CSMA/CD here:

https://brainly.com/question/32413257

#SPJ6

Magnetic tapes are a good choice for backups that need to be kept for five or more years.

True

False

Answers

Answer:

True.

Explanation:

Magnetic tape is used to store data.It is one of the oldest technology for data storage.It is suitable for  high volume data and storing it for long duration.It's cost is also very less.

Magnetic Tapes are well suited for storing data for long duration because of it's durability.It's shelf life is 30-years.

Why is exception handling an issue for testers in object-oriented developments?

Answers

Answer:

 The exception handling occurs when the unexpected events are happened, which basically require special type of processing. The exception handling is the mechanism that mainly handle all type of the exception during the run time process in the system.

In the object oriented programming, the testers face issue during the development as it used for prevent the abnormal node in the program and also it customize the exceptional message in the system.

We basically used the try catch block in the exception handling as, it efficiently handle the difficult situation in the object oriented development.

A bowl contains 20 candies; 15 are chocolate and 5 are vanilla. You select 5 at random. What is the probability that all 5 are chocolate?

Answers

Answer: 0.1937

Explanation:

Given : A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

[tex]^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360[/tex]

The number of ways of selecting any 5 candies out of 20:-

[tex]^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480[/tex]

Now, the probability that all 5 are chocolate :-

[tex]=\dfrac{360360}{1860480}=0.193691950464\approx0.1937[/tex]

Hence, the probability that all 5 are chocolate =0.1937

Answer:

A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360

15

P

5

=

(15−5)!

15!

=

10!

15×14×13×12×11×10!

=360360

The number of ways of selecting any 5 candies out of 20:-

\begin{lgathered}^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480\end{lgathered}

20

P

5

=

(20−5)!

20!

=

15!

20×19×18×17×16×15!

=1860480

Now, the probability that all 5 are chocolate :-

=\dfrac{360360}{1860480}=0.193691950464\approx0.1937=

1860480

360360

=0.193691950464≈0.1937

Hence, the probability that all 5 are chocolate

What is ‘validation’?

Answers

Talking about models, validation is the process by the model is corroborated and its outputs are compared with experimental results. From validation, it can be seen how quantitative and qualitative accurate the model is, and it can be confirmed model fidelity to the real world.

List and describe four communication tools that are currently popular.

Answers

Answer: Communications tool that are currently popular are as follow:

a) Intranet:

Intranet is known as a private hub which can be accessed by an authorized individual within an organisation. It is predominately utilized in order to drive internal collaboration and communication.

b) Private Messaging :

Spaces that provide private messaging and also other functions are often perceived as great tool for business communication, in order to keep teams working together. It’s referred to as an effective type of communication mostly for employees and managers.

c) Discussion Forums :

A discussion forum can be referred to as something which brings together employees and management and thus allows for open discussion on several topics. Forums are effective in order to archive organisational knowledge that can be used by individuals as a reference.

d) Internal Blogs :

Internal blog is known as a place where an employee or an individual can share experiences and notion fast and also in an informal way.

An instance of an abstract class can be created using _____. (Points : 2) the new operator
encapsulation
a public accessor
None of the above

Answers

Answer:

The correct answer for the given question is the new operator.

Explanation:

An abstract class is those which have the only declaration of the abstract method, not a definition. Any class which inherits abstract class must define all the method of abstract otherwise it also be abstract.

To declared any abstract class following syntax is used  

abstract class class name

{

// abstract method  

}

To create an instance of an abstract class we can use a new keyword. The new keyword created the instance of an abstract class.

encapsulation is the feature of object-oriented we cannot create an object by using encapsulation so this option is wrong.

The public is an access modifier we cannot create an object by using public keyword so this option is also wrong.

Therefore the correct answer is new.

What is the difference between a switch and a hub?

Answers

Explanation:

A hub is used to send the message from one port to other ports.It does not know the specific address of the destination where the message needs to send.it works on Physical layer of the OSI model(layer 1).

A switch can handle data and it knows the specific address of the destination.A switch works on the data link Layer of the OSI model(layer 2).

A chart that shows the resource (project team member) along with their allocated hours for each week is known as a(n):

Select one:

a. Project staffing chart

b. GANTT chart

c. Histogram

d. Entity diagram

Answers

Answer: b) GNATT chart

Explanation: GNATT is the type of chart that displays the schedule or working in the form of bars in horizontal direction .The chart displays the duties /task performed on the vertical axis and the time periods on horizontal axis week-vise. This chart is usually used for project management purpose fr coordination, tracing, planning etc.

Other options are incorrect because project staffing chart is for the display of the staff activities involved during project, histogram is graph representation using bars of different heights and entity diagram displays the entities relation in databases..Thus , the correct option is option(b).

With an example in each, describe the use of two basic functions which are known by the "string.h" header file.

Answers

Answer:

strcmp(char * A, char * B);

strcat(char * A, char * B)

Explanation:

One of these basic functions is the function strcmp(char * A, char * B).

This functions compares if two strings are equal; If they are, it returns 0. If not, it returns 1;

So, an example:

char A[13] = "Buffalo Bills";

char B[13] = "Buffalo Bills";

if (strcmp(A,B) == 0)

printf("The strings are the same\n);

else

printf("The strings are not the same");

In this case, they are the same.

----------------------

If for example:

char B[13] = "Buffalo Billz"

It would fall in the else, A and B would not be the same strings.

--------------------------

Other function is the strcat(char * A, char * B);

This function takes two strings as an input, and concatenate them to the first.

For example:

char A[15] = "Buffalo";

char B[5] = "Bills";

strcat(A, B);

printf("%s\n", A);

The output is:

Buffalo Bills

What is the effect of block size in cache design?

Answers

Answer:

When designing a cache, you have to consider this things:

Delay. Miss rate. Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

Final answer:

The block size in cache design determines the amount of data stored in each cache block. It affects cache hit rate and wasted storage space. The optimal block size depends on various factors.

Explanation:

The block size in cache design refers to the amount of data that can be stored in each cache block. It plays a crucial role in determining the cache's performance and efficiency. A larger block size can lead to a lower cache miss rate and higher hit rate, as it allows for more data to be fetched from memory at once. However, a larger block size also results in more wasted storage space, known as internal fragmentation.

For example, let's consider a cache with a block size of 64 bytes. If the processor requests a single 4-byte integer, the cache will still load the entire 64-byte block into the cache. This leads to wasted space and can reduce the effective cache capacity. On the other hand, if the block size is too small, the cache may experience frequent cache misses, as it would need to load more blocks to fetch the required data.

Choosing the optimal block size involves balancing the trade-off between cache hit rate and wasted storage space. Factors like the access pattern of the application, cache associativity, and memory bandwidth also influence the effect of block size on cache performance.

A group of related files is stored in a(n

Answers

Answer: Records

Explanation:

A group of the related file is basically stored in a record as record is the collection of the related field.

A record is the object in the database that basically contain one and more than one value.

In the database, the records are also store in the form of table and in table the data are in the form of rows and columns. There is multiple table in the database and each of the table basically contain multiple records.

Perform the following calculations. Make sure the units of the solution are correct.

a.10 Kbps * 3

b.10 Mbps * 3 sec

c.Convert 2400 bits to bytes

Answers

Answer:

30 Kbps

30 Mb

300 bytes

Explanation:

a. 10 Kbps * 3 = (10 * 3) Kbps = 30 Kbps [Note: numbers and units are aggregated and processed separately]

b. 10 Mbps * 3 sec  = (10 * 3) Mbps * sec = 30 Mbps*s = 30 Mb [Note: numbers and units are aggregated and processed separately]b

c. Byte is a unit of storage in a computer. 1 byte is made up of eight bits, while each bit  can be either 0 or 1.

1 byte = 8 bit

=> 1 bit = 1/8 byte

=> 2400 bits = 1/8 * 2400 = 300 bytes

Write a C++ program to read N numbers. Find sum, product, and average of N numbers

Answers

Answer:

// here is code in c++

// headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int n,num;

   double sum=0, avg;

   long long int prod=1;

   cout<<"Enter value of N:";

   // read value of N

   cin>>n;

   cout<<"enter "<<n<<" numbers:";

   // read the N numbers

   for(int x=0;x<n-1)

   {

    cin>> num;

    // calculate sum of all

    sum=sum+num;

    calculate product of all

    prod=prod*num;

   }

   // print sum

   cout<<"sum of all "<<n<<" numbers is: "<<sum<<endl;

   // print product

   cout<<"product of all numbers is : "<<prod<<endl;

   print average

   cout<<"average of all "<<n<<" numbers is: "<<sum/n<<endl;

return 0;

}

Explanation:

Read the value of n from user.Then ask user to enter n numbers. Then calculate sum of all entered number and their product.After this calculate the average of entered number by dividing sum with n.Print sum, product and average of n numbers.

Output:

enter value of N:6

enter 6 numbers:1 2 3 4 5 6

sum of all 6 numbers is: 15

product of all numbers is : 120

average of all 6 numbers is: 2.5

Final answer:

The program starts by asking the user to specify the number of elements (N). The program demonstrates user input, loops, and basic arithmetic operations to achieve the desired output.

Explanation:

A sample C++ program that performs this task is :

#include
using namespace std;

int main() {
   int N, number;
   cout << "Enter the number of elements: ";
   cin >> N;
   double sum = 0.0, product = 1.0;
   for (int i = 0; i < N; ++i) {
       cout << "Enter number " << (i+1) << ": ";
       cin >> number;
       sum += number;
       product *= number;
   }
   double average = sum / N;
   cout << "Sum = " << sum << endl;
   cout << "Product = " << product << endl;
   cout << "Average = " << average << endl;
   return 0;
}
The program starts by asking the user to specify the number of elements (N). It then enters a loop, prompting the user for each number adding to the sum and multiplying the product with each entered number. After going through all N numbers, it calculates the average and prints the sum, product, and average.

What is the purpose of a mutator?

Answers

Answer:

To change the value of private or protected members.

Explanation:

Mutator also known as setters are the member function or method in class that is used to set or change the value of private or protected members. Mutator does not return any values. They are very important in Object Oriented Programming.

What is an E-R diagram?

Answers

Answer:

 The E-R diagram is basically used in the designing and debugging the relational database in the field of the information system and software engineering.

In the E-R diagram, entity is the object and the component of the data that is used to represent as rectangle.

This E-R diagram is basically used to control the conjunction in the DFD (Data flow diagram). Entities, attribute and action are the three main components that are used in the E-R diagram.

Discuss why Web services are important to Web development

Answers

Answer:

 The web services is the software that uses over the internet and also used various standard XML message system.

The web services is basically used in various applications to make the platform and various types of the technologies independent.

The web services play very important role in the web development as, it allow various types of applications to share data and different types of services with each other in the system. It is used in various UNIX applications and java for the communication purpose.


Is 49 greater than y? Which below is correct?
A) 49 > y
B) 49 >= y
C) 49 < y
D)49 != y

Answers

Answer:

49>y

Explanation:

Given objective: Is 49 greater than y?

Among the options:  

a) 49 > y => 49 is greater than y

b) 49 >= y => 49 greater than or equal to y

c) 49 <y => 49 is less than y or in other words, y is greater than 49.

d) 49 !=y => 49 is not equal to y.

So the requires solution is represented by (a) namely, 49>y . This can be alternatively read as y<49, that is y is less than 49. The other options do not represent the given requirement as illustrated earlier.  

What are CRC cards and use-case scenarios used for in object-oriented analysis and design?

Answers

CRC stands for class, responsibilities, and collaborators. The analyst can use these concepts when beginning to talk about or model the system from an object-oriented perspective. CRC cards are used to represent the responsibilities of classes and the interaction between the classes.

CRC cards and use-case scenarios are crucial tools in object-oriented analysis and design. They involve defining class responsibilities and interactions (CRC) and detailing user-system interactions (use-case scenarios). These tools help construct efficient computer models by identifying patterns and structures within systems.

Understanding CRC Cards

CRC cards are a brainstorming tool used to represent the responsibilities of classes and how they interact with other classes. Each card typically has three sections: the class name, the responsibilities of the class, and the collaborators (other classes) that the class interacts with.

For example, a CRC card for a Library class might look like this:

Class: LibraryResponsibilities: Manage books, Issue loans, Return booksCollaborators: Book, Member, Loan

Use-Case Scenarios

Use-case scenarios describe the interactions between a user and a system to achieve a specific goal. These scenarios help in understanding the functional requirements of the system by detailing the sequence of actions and reactions required to complete a given task.

For example, a use-case scenario for borrowing a book might include:

User logs inUser searches for a bookUser requests a loanSystem checks for availabilitySystem issues the loan

Both CRC cards and use-case scenarios provide a structured approach to analyze and design a system, ensuring that all necessary interactions and responsibilities are accounted for.

BI systems have eliminated a common organizational problem, which is simultaneously having too much data but somehow not enough.
a. True
b. False

Answers

Answer:

True

Explanation:

Most of the organization suffers from InfoObesity, i.e., too much data without the proper holding structure for this.

Business intelligence abbreviated as BI plays a major role in the determining the planning strategies of an organizations and serves multiple purposes which includes measurement of performance towards business objectives, quantitative analysis, data reporting and sharing, etc.

BI systems helps in eliminating InfoObesity, by manging the data and filtration of the data with proper data structure to serve specific purposes.

Residential and business customers are paying different rates for water usage. Residential customers pay $0.005 per gallon for the first 6000 gallons. If the usage is more than 6000 gallons, the rate will be $0.007 per gallon after the first 6000 gallons. Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.

Answers

Answer:

// here is program in Java.

// import package

import java.util.*;

// class definition

class Main

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

   // variable

   int gall;

   double cost=0;

       // object to read value from user

    Scanner scr=new Scanner(System.in);

     // ask user to enter type

    System.out.print("Enter customer type  (R for residential or B for business ):");

    // read type of customer

       char t=scr.next().charAt(0);

       if(t=='r'||t=='R')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 6000

           if(gall<=6000)

            {

           // calculate cost

           cost=gall*0.007;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {

           // calculate cost

            cost=(6000*0.005)+((gall-6000)*0.007);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

       else if(t=='b'||t=='B')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 8000

           if(gall<=8000)

            {

           // calculate cost

           cost=gall*0.006;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {// calculate cost

            cost=(8000*0.006)+((gall-8000)*0.008);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Ask user to enter the type of customer and assign it to variable "t" with scanner object.If the customer type is business then read the number of gallons from user and assign it to variable "gall". Then calculate cost of gallons, if   gallons are less or equal to 8000 then multiply it with 0.006.And if gallons are greater than 8000, cost for  first 8000 will be multiply by 0.006 and   for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 6000 gallons cost will be multiply by 0.005 and for rest it will  multiply by 0.007. Then print the cost.

Output:

Enter customer type  (R for residential or B for business ):r

enter the number of gallons:8000

total cost is: 44.0

Twitter, Foursquare, and other real-time media add to or leverage capabilities of smartphones--improving your ability to be well-informed in real-time.
a. True
b. False

Answers

Answer: True

Explanation: Twitter is the application that functions online for providing news and communication for connecting people on social network.Foursquare is also an online app that works on the social platform in the smartphones and provide the knowledge about activity of people moving through the real-time world.

Other real world apps that operate in the real time helps in providing information about the activities and incidents happening through the smartphones.This also increases the knowledge of the individual by discovering, reading,sharing of the information.Thus the statement given is true.

A 40 fps(frames per second) video clip at 5 megapixels per frame would generate large amount of pixels equivalent to a speed of ____________megabps(megabits per second).

4800
200
600

Answers

Answer:

[tex]4800\dfrac{megabytes}{second}[/tex]

Explanation:

We have the next two data:

[tex]40\,\dfrac{frames}{second}[/tex]

[tex]5\,\dfrac{megapixels}{frame}[/tex]

Now we can find the number of megapixels per second.

[tex]40\dfrac{frames}{second}\cdot 5\dfrac{megapixels}{frame}=200\dfrac{megapixels}{second}[/tex]

Finally considering an RGB video we will have 3 channels each one with 8 bytes then we will have 24 bytes per each pixel then:

Describe practices that enable software designers to think about using patterns?

Answers

Answer:

 Firstly, the software designer basically understand the pattern of the system by think with broader perspective. By establish the pattern first design the proper context of the system.

The pattern dependency basically focus on manage the relationship between the different types of the modules. It basically provide the actual guidance which increase the reuse-ability of the module.  

We can also extract the given pattern that from the level of the abstraction and lack cohesion modules are basically difficult to maintain.

Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.

Answers

Answer:

SCAN disk scheduling is the algorithm in which a certain arm of disk rotates in particular direction and serves the requests that arrive from that path. It scans the cylinder's disk in both back and forth direction.

If the arm reaches the bottom of the disk , it automatically stars working in the opposite direction and serves the request in the reverse direction path.As this functioning is similar to the elevator movement ,it is also known as elevator algorithm.

A(n) _____ provides an organization with vision and leadership in the area of business conduct.

Corporate ethics officer
Code of conduct
Code of ethics
Common good practice

Answers

Answer: Corporate ethics officer

Explanation:Corporate ethics officer is the officer that is responsible for examining the business conduct of an organization. The duties of the officer includes the looking after the functioning, execution,development and other factors of the business.They follow the leadership to maintain the ethics and polices.

Other options are incorrect because code of conduct and ethics are general codes that can be followed by schools, individual etc and not necessarily by organization.Common good practices is the practicing of the general good habits and  conducts. Thus, the correct answer is Corporate ethics officer

.Name two loaders used in Linux?

Answers

Answer:

LOADLIN(Load linux)    LILO(Linux Loader).

Explanation:

Loader is a computer program that is used in linux to load linux in the memory.In linux we have to install a special loader while in other operating system we do not need to  install the loader it comes in them by default.

The two most common loader in linux are as following:-

LOADLIN(Load Linux).LILO(Linux Loader).

An expression using the conditional operator is called a(n) __________ expression.

Answers

Answer: Conditional expression

Explanation: Conditional operators are those operators that are used between two values or variables for the given condition. This operator return an answer after evaluating the condition that can turns out to be true or false .

They also help in increment and decrement of the variable value by one according to condition.Conditional expression are those expression that use conditional operator in their statement for gaining a return value according to the condition being true or false.

. Convert BAC4 from hexadecimal to decimal. Show your work.

Answers

Answer:

BAC4₁₆ = 47812₁₀

Explanation:

To convert from hexadecimal base system to decimal base system use this formula:

[tex]N = x_1 * 16^0 + x_2 * 16^1 + x_3 * 16^2 + x_4 * 16^3+ ... + x_n 16^n^-^1[/tex]

, where position of the x₁ is the rightmost digit of the number.

and:

A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.

BAC4 = 11*16³+10*16²+C*16¹+4*16⁰ = 45056 + 2560 + 192 + 4 = 47812

___________ are used when an SQL statement has to be executed multiple times in a Python script.

a

Prepared statements

b

Cursors

c

Connections

d

Queries

Answers

Answer: (A) Prepared statement

Explanation:

 Prepared statement is basically used in the structured query language (SQL) statement which are basically execute multiple times in the python script.

The prepared statement is typically used in the SQL statement for update and queries. It is used to executed for the similar SQL statement and it has high efficiency.

It basically is in the form of template where the database compile and perform various query optimization.

Other Questions
Your current income is $50,000 per year, and you would like to maintain your current standard of living (i.e., your purchasing power) when you retire. If you expect to retire in 30 years and expect inflation to average 3% over the next 30 years, what amount of annual income will you need to live at the same comfort level in 30 years? A materials demonstrating low to heat conduction would be categorized under which property catagory?ElectricalThermalOpticalMagneticMechanical Select all that apply.Examples of audience interaction by the speaker include:questions and answersdialoguebody posturefeedback Your co-worker was talking about how, after the academic year, he is going back to Japan. His grandmother is turning 60 years old and they have a ritual that symbolizes the person's freedom from previous responsibilities and elevates the individual to a new and respected status as elder. What is the name of this ritual? lim x2 (x^3-8)/(x-2) 1. There are two differnt maps of Ohio. The scale on the first map is 1 cm to 10 km. The distance from Cleveland to Cincinnati is 40 km. The scale on the second map is 1 cm to 50 km. What is the distance from Cleveland to Cincinnati on the second map?2. Elena wants to make a scale drawing of her bedroom. Her bedroom is a rectangle with length 5 m and width 3 m. She decides on a scale of 1 to 50 . Elenas bedroom door is 0.8 m wide. How wide should the door be on the scale drawning? eview Questions1. Compare qualitative and quantitative physical properties. Useexamples of properties listed in Tables 4.2 and 4.3 as part of yourdiscussion Solve using proper scientific notation: (use a ^ for the exponent) (1.26 x 104 kg) + (2.5 x 106 g) = ____________________ in kg ? Qu hora es? (4:14)A. Son las cuatro y cuatro.B. Son las cuatro menos cuatroC. Son las cuatro Y catorceD. Son las cuatro y veinticuatro A small metal sphere of mass 3.1 g and charge 2.6 C is fired with an initial speed of 5.6 m/s directly toward the center of a second metal sphere carrying charge 3.4 C. This second sphere is held fixed. If the spheres are initially a large distance apart, how close do they get to each other? Treat the spheres as point charges. The following information is related to the defined benefit pension plan of Dreamworld Company for the year: Service cost $ 61,000 Contributions to pension plan 111,000 Benefits paid to retirees 156,000 Plan assets (fair value), January 1 643,000 Plan assets (fair value), December 31 750,000 Actual return on plan assets 152,000 PBO, January 1 910,000 PBO, December 31 906,000 Discount rate 10 % Long-term expected return on plan assets 9 % Assuming no other relevant data exist, what is the pension expense for the year? Forty percent of world class tennis player are over 6 feet tall. 20 percent of the world class tennis players over 6 feet tall were premature babies. 30 percent of the world class tennis players who are not over 6 feet tall were premature babies. a. Calculate the probability that a randomly selected world class tennis player is over 6 feet tall and was a premature baby. Don't just write a number for the answer. Use the probability notation, simplify the answer, and show your work. b. Calculate the probability that a randomly selected world class tennis player is not over 6 feet tall and was not a premature baby. Don't just write a number for the answer. Use the probability notation, simplify the answer, and show your w ork. Relate the structure of DNA to its function. How many milliliter are in 0.063 L an alternator consists of a coil of area A with N turns that rotates in a uniform field B around a diameter perpendicular to the field with a rotation frequency f. a)find the fem in the coil b)what is the amplitude of the alternating voltage if N= 100 turns, A = 10 ^ -2 m ^ 2, B = 0.1T, f = 2000 rev/min Multiple ChoiceWhich of the properties tell how things are organized?*FormalExpressiveSensoryTechnical Five students visiting the student health center for a free dental examination during National Dental Hygiene Month were asked how many months had passed since their last visit to a dentist. Their responses were as follows: 6 17 11 22 29 Assuming that these five students can be considered a random sample of all students participating in the free checkup program, construct a 95% confidence interval for the mean number of months elapsed since the last visit to a dentist for the population of students participating in the program. Draw the Pressure - Temperature Diagram showing the liquid and vapor phases, along with the saturation line and the critical point (no need to include the solid section). The temperature was 65 degrees at daybreak. Then it dropped two degrees per hour until dusk. This decrease in temperature can be modeled by the equation, y = -2x + 65. Using the model, what is the temperature 6 hours after daybreak? 77 67 57 53 Find the magnitude of vector A = i - 2j + 3k O V14 10 O4